Sciweavers

2614 search results - page 262 / 523
» Information System Architectures: From Art to Science
Sort
View
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
WWW
2009
ACM
14 years 9 months ago
Why is the web loosely coupled?: a multi-faceted metric for service design
Loose coupling is often quoted as a desirable property of systems architectures. One of the main goals of building systems using Web technologies is to achieve loose coupling. How...
Cesare Pautasso, Erik Wilde
CSCW
2004
ACM
14 years 1 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
DAC
2004
ACM
14 years 9 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
KCAP
2003
ACM
14 years 1 months ago
LitLinker: capturing connections across the biomedical literature
The explosive growth in the biomedical literature has made it difficult for researchers to keep up with advancements, even in their own narrow specializations. In addition, this c...
Wanda Pratt, Meliha Yetisgen-Yildiz